Analysis
-
max time kernel
162s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 14:17
Static task
static1
Behavioral task
behavioral1
Sample
Maersk Ratesheet.Scan...exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Maersk Ratesheet.Scan...exe
Resource
win10v2004-20220414-en
General
-
Target
Maersk Ratesheet.Scan...exe
-
Size
1.2MB
-
MD5
74cff6e4840dd481d888d12f89629f4a
-
SHA1
4d8b01c1939faf241abdeef11e87a16c498bc2e2
-
SHA256
53b4179d18dc27443d5182752aaf6d78253ec7fc4eac192dcf6078884af51535
-
SHA512
9a3edd39d511c4098cc976d072a2d0b628aaff76be126f5b1143a8114cf56183aed64aacbca48b8ce5086a79f4b1acbc16144a2800e9b10a558604cdbc90adeb
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\8236ADF044\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 33 IoCs
resource yara_rule behavioral2/memory/1112-132-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-134-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-136-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-138-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-140-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-142-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-144-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-146-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-148-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-150-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-152-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-154-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-156-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-158-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-160-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-162-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-164-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-166-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-168-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-170-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-172-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-174-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-176-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-178-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-180-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-182-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-184-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-186-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-188-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-190-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-192-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-194-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger behavioral2/memory/1112-196-0x0000000000BD0000-0x0000000000C78000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Maersk Ratesheet.Scan...exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vvbn.vbs notepad.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 408 set thread context of 1112 408 Maersk Ratesheet.Scan...exe 82 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 408 Maersk Ratesheet.Scan...exe 408 Maersk Ratesheet.Scan...exe 1112 Maersk Ratesheet.Scan...exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 408 Maersk Ratesheet.Scan...exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1112 Maersk Ratesheet.Scan...exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 408 wrote to memory of 4012 408 Maersk Ratesheet.Scan...exe 81 PID 408 wrote to memory of 4012 408 Maersk Ratesheet.Scan...exe 81 PID 408 wrote to memory of 4012 408 Maersk Ratesheet.Scan...exe 81 PID 408 wrote to memory of 4012 408 Maersk Ratesheet.Scan...exe 81 PID 408 wrote to memory of 4012 408 Maersk Ratesheet.Scan...exe 81 PID 408 wrote to memory of 1112 408 Maersk Ratesheet.Scan...exe 82 PID 408 wrote to memory of 1112 408 Maersk Ratesheet.Scan...exe 82 PID 408 wrote to memory of 1112 408 Maersk Ratesheet.Scan...exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Maersk Ratesheet.Scan...exe"C:\Users\Admin\AppData\Local\Temp\Maersk Ratesheet.Scan...exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\Maersk Ratesheet.Scan...exe"C:\Users\Admin\AppData\Local\Temp\Maersk Ratesheet.Scan...exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-